-
All
-
Online
-
Filters
IT Governance Europe Ltd courses
- Course
- Distance Learning
...Requirements and Guidance. Program Buy ISO28001:2007 today!ISO28001:2007 provides requirements and guidance for organisations in international supply chains...
- Course
- Distance Learning
...Defines the rules applicable for the audit and certification of a supply chain security management system complying with the supply chain security management...
- Course
- Distance Learning
...Pages: 56 Format: Hardcopy Published Date: 12 October 2007 Availability: In Stock Buy this essential ISO28000 implementation guidance today!...
- Course
- Distance Learning
...Understand where to position and install the CSACS in your network. Explore and customize the CSACS interface. Configure CSACS user accounts...
- Course
- Distance Learning
...The book shows you how RBAC simplifies security administration by using roles, hierarchies, and constraints to manage the review and control of organizational privileges...
- Course
- Distance Learning
...is designed for security software developers and other security professionals as a resource for setting scopes of implementations with respect to the formal...
- Vocational qualification
- Distance Learning
...Electronic Access Control book is the first to focus on the design and installation of electronic access control systems. Description Electronic Access...
- Course
- Distance Learning
...a wide range of common security problems. The authors show how to determine acceptable levels of risk, develop effective security testing processes...
- Course
- Distance Learning
...including secure knowledge management, secure semantic web, secure dependable data management, secure sensor databases, and facets of digital identity and digital forensics... Learn about: Data Management...
- Course
- Distance Learning
...more-secure applications with ASP.NET 2.0. with this bestselling book. Program Your definitive guide to the core topics for building security-enhanced Web applications...
- Course
- Distance Learning
...of the ways software is vunerable to attack by purchasing this essential book today...
- Course
- Distance Learning
...have their basis in good software engineering and involve explicitly pondering security throughout the software development lifecycle. This means knowing...
- Course
- Distance Learning
...Conduct a final security review before a product ships. Arm customers with prescriptive guidance to configure and deploy your product more securely...
- Course
- Distance Learning
...profile for a system Reveal vulnerabilities in system architecture and implementation using investigative techniques such as threat trees and threat model-directed code reviews...
- Course
- Distance Learning
...and developers will be urged to write more secure code on the platform to support a growing customer base. This reference delivers the straight scoop...
- Course
- Distance Learning
...Discover the best practices for writing secure code and stopping malicious hackers in their tracks-direct from the top security experts at Microsoft! Description...
- Course
- Distance Learning
...every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks...
- Course
- Distance Learning
...Protocols, Algorithms, and Source Code in C, Second Edition details how programmers and electronic communications professionals can use cryptography-the...
- Course
- Distance Learning
...Author: David Hook Publisher: John Wiley ISBN 10: 0764596330 ISBN 13: 9780764596339 Pages: 448 Format: Soft Cover Published Date: August 2005 Availability...
- Course
- Distance Learning
...in modern cryptography and his book offers a practical understanding of essential tools and applications to help with your daily work.' ' There is complete...